• Docs »
  • User Guides »
  • Authentication and Authorization »
  • Authentication with Cookie

  • Introduction
    • Open Source Kubeflow Components
      • Jupyter Notebook Services
      • Model Training Operators
      • The Katib Hyperparameter Tuning System
      • Pipelines System
      • The Machine Learning Metadata DB
      • Central Dashboard
    • Arrikto Enterprise Kubeflow Components and Features
      • Kale
        • Iterate on ML Code without Creating New Docker Images
        • Deploy Pipelines Directly from Your Code
        • Run Pipelines from Your IDE
        • Kale Automatically Manages Dependencies
        • Snapshot and Reproduce Pipelines and Steps
        • Tune Hyperparameters
        • Serve Models
      • Rok
        • Run Pipelines on High Performance NVMe Devices
        • View and Manage Files in PVCs
        • Package Your Environment with Snapshots
        • Version your Environment
        • Schedule Snapshots and Define Retention Policies
        • Create New Volumes from Snapshots
        • Rok Registry
  • Install
    • Prepare Management Environment
      • Create Management Environment
        • Option 1: Create Management Environment on Kubernetes (preferred)
          • What You’ll Need
          • Procedure
        • Option 2: Create Management Environment on Local Docker
          • What You’ll Need
          • Procedure
        • Option 3: Create Management Environment on a Cloud Instance
          • What You’ll Need
          • Procedure
        • Verify
        • Summary
        • What’s Next
      • Configure Git
        • What You’ll Need
        • Option 1: Configure Git Automatically (preferred)
        • Option 2: Configure Git Manually
          • Procedure
          • Verify
        • Summary
        • What’s Next
      • Clone GitOps Repository
        • What You’ll Need
        • Option 1: Clone GitOps Repository Automatically (preferred)
        • Option 2: Clone GitOps Repository Manually
          • Procedure
          • Verify
        • Summary
        • What’s Next
      • Configure CLI
        • Procedure
          • Configure AWS CLI
            • What You’ll Need
            • Option 1: Configure AWS CLI Automatically (preferred)
            • Option 2: Configure AWS CLI Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
          • Configure Azure CLI
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Configure Google Cloud SDK
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
      • Set Up Cloud Environment
        • What You’ll Need
        • Procedure
          • Set Up Cloud Environment for AWS
            • What You’ll Need
            • Option 1: Set Up Cloud Environment for AWS Automatically (preferred)
            • Option 2: Set Up Cloud Environment for AWS Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
          • Set Up Cloud Environment for Azure
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
          • Set Up Cloud Environment for Google Cloud
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
      • Configure Access to Arrikto’s Private Registry
        • What You’ll Need
        • Option 1: Configure Access to Arrikto’s Private Registry Automatically (preferred)
        • Option 2: Configure Access to Arrikto’s Private Registry Manually
          • Procedure
          • Verify
        • Summary
        • What’s Next
    • Create Virtual Private Cloud
      • What You’ll Need
      • Procedure
        • Create VPC on AWS
          • Create VPC
            • What You’ll Need
            • Option 1: Create VPC for your EKS Cluster Automatically (preferred)
            • Option 2: Create VPC for your EKS Cluster Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
          • Configure Subnets
            • What You’ll Need
            • Option 1: Configure Subnets Automatically (preferred)
            • Option 2: Configure Subnets Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
    • Create Kubernetes Cluster
      • What You’ll Need
      • Procedure
        • Create Kubernetes Cluster on AWS
          • Create EKS Cluster IAM Role
            • What You’ll Need
            • Check Your Environment
            • Option 1: Create EKS Cluster IAM Role Automatically (preferred)
            • Option 2: Create EKS Cluster IAM Role Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
          • Create EKS Node IAM Role
            • What You’ll Need
            • Check Your Environment
            • Option 1: Create EKS Node IAM Role Automatically (preferred)
            • Option 2: Create EKS Node IAM Role Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
          • Create EKS Cluster
            • What You’ll Need
            • Check Your Environment
            • Option 1: Create EKS Cluster Automatically (preferred)
            • Option 2: Create EKS Cluster Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
          • Enable IAM Roles for Kubernetes Service Accounts
            • What You’ll Need
            • Check Your Environment
            • Option 1: Enable IAM Roles for Kubernetes Service Accounts Automatically (preferred)
            • Option 2: Enable IAM Roles for Kubernetes Service Accounts Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
          • Access EKS Cluster
            • What You’ll Need
            • Check Your Environment
            • Option 1: Access EKS Cluster Automatically (preferred)
            • Option 2: Access EKS Cluster Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
          • Create EKS Node Group
            • What You’ll Need
            • Procedure
              • Create EKS Managed Node Group
                • What You’ll Need
                • Check Your Environment
                • Option 1: Create EKS Managed Node Group Automatically (preferred)
                • Option 2: Create EKS Managed Node Group Manually
                  • Procedure
                  • Verify
                • Summary
                • What’s Next
              • Create EKS Self-Managed Node Group
                • What You’ll Need
                • Procedure
                • Verify
                • Summary
                • What’s Next
          • Disable Unsafe Operations for Your EKS Cluster
            • What You’ll need
            • Procedure
            • Verify
            • Summary
            • What’s Next
        • Create Kubernetes Cluster on Azure
          • Create Resource Group
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Create AKS Cluster
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Access AKS Cluster
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Create User Node Pool
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Add Disks for Rok to Use
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
        • Create Kubernetes Cluster on Google Cloud
          • GKE Alpha Access
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Create GKE Cluster
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Restrict Auto-Upgrades
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Access GKE Cluster
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Enable Workload Identity on GKE
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
    • Deploy Rok
      • What You’ll Need
      • Procedure
        • Create Storage Account (Azure only)
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Deploy Istio
          • What You’ll Need
          • Option 1: Deploy Istio Automatically (preferred)
          • Option 2: Deploy Istio Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Create Cloud Identity
          • What You’ll Need
          • Procedure
            • Create Cloud Identity on AWS
              • What You’ll Need
              • Option 1: Create Cloud Identity Automatically (preferred)
              • Option 2: Create Cloud Identity Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Create Cloud Identity on Google Cloud
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
        • Authorize Access to Object Storage
          • What You’ll Need
          • Procedure
            • Authorize Access to Object Storage on AWS
              • What You’ll Need
              • Option 1: Authorize Access to Object Storage Automatically (preferred)
              • Option 2: Authorize Access to Object Storage Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Authorize Access to Object Storage on Azure
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
            • Authorize Access to Object Storage on Google Cloud
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
        • Grant Rok Access to Private Docker Registry
          • What You’ll Need
          • Option 1: Grant Rok Access to Private Docker Registry Automatically (preferred)
          • Option 2: Grant Rok Access to Private Docker Registry Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Set Up Users for Rok
          • What You’ll Need
          • Option 1: Set Up Users Automatically (preferred)
          • Option 2: Set Up Users Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Configure Rok Account Management
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Deploy Snapshot Controller
          • What You’ll Need
          • Option 1: Deploy Snapshot Controller Automatically (preferred)
          • Option 2: Deploy Snapshot Controller Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Create IAM Role for EBS CSI Driver (AWS Only)
          • What You’ll Need
          • Check Your Environment
          • Option 1: Create IAM Role for EBS CSI Driver Automatically (preferred)
          • Option 2: Create IAM Role for EBS CSI Driver Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Deploy EBS CSI Driver (AWS Only)
          • What You’ll Need
          • Option 1: Deploy EBS CSI Driver Automatically (preferred)
          • Option 2: Deploy EBS CSI Driver Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Deploy Rok Disk Manager
          • What You’ll Need
          • Option 1: Deploy Rok Disk Manager Automatically (preferred)
          • Option 2: Deploy Rok Disk Manager Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Deploy Rok Components
          • What You’ll Need
          • Option 1: Deploy Rok Components Automatically (preferred)
          • Option 2: Deploy Rok Components Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Test Rok
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Set Up Rok Storage Class
          • What You’ll Need
          • Option 1: Set Up Rok Storage Class Automatically (preferred)
          • Option 2: Set Up Rok Storage Class Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
    • Deploy Rok Scheduler
      • What You’ll Need
      • Option 1: Deploy Rok Scheduler Automatically (preferred)
      • Option 2: Deploy Rok Scheduler Manually
        • Procedure
        • Verify
      • Summary
      • What’s Next
    • Deploy Kubeflow
      • What You’ll Need
      • Procedure
        • Install Kubeflow
          • What You’ll Need
          • Option 1: Install Kubeflow Automatically (preferred)
          • Option 2: Install Kubeflow Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Integrate Rok with Kubeflow Dashboard
          • What You’ll Need
          • Option 1: Integrate Rok with Kubeflow Dashboard Automatically (preferred)
          • Option 2: Integrate Rok with Kubeflow Dashboard Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Test Kubeflow
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
    • Deploy Rok Registry
      • What You’ll Need
      • Procedure
        • Grant Rok Registry Access to Private Docker Registry
          • What You’ll Need
          • Option 1: Grant Rok Registry Access to Private Docker Registry Automatically (preferred)
          • Option 2: Grant Rok Registry Access to Private Docker Registry Manually
            • Procedure
          • Summary
          • What’s Next
        • Set Up Default User for Rok Registry
          • What You’ll Need
          • Option 1: Set Up Default User Automatically (preferred)
          • Option 2: Set Up Default User Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Configure Rok Registry to Use AuthService
          • What You’ll Need
          • Option 1: Configure Rok Registry to Use AuthService Automatically (preferred)
            • Procedure
          • Option 2: Configure Rok Registry to Use AuthService Manually
            • Procedure
          • Verify
          • Summary
          • What’s Next
        • Configure Rok Registry to Use Dex
          • What You’ll Need
          • Option 1: Configure Rok Registry to Use Dex Automatically (preferred)
          • Option 2: Configure Rok Registry to Use Dex Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Deploy Rok Registry Components
          • What You’ll Need
          • Option 1: Deploy Rok Registry Components Automatically (preferred)
          • Option 2: Deploy Rok Registry Components Manually
            • Procedure
            • Verify
          • Summary
          • What’s Next
        • Test Rok Registry
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
    • Deploy Cluster Autoscaler
      • What You’ll Need
      • Procedure
        • Deploy Cluster Autoscaler on AWS
          • Create IAM Role for Cluster Autoscaler
            • What You’ll Need
            • Check Your Environment
            • Option 1: Create IAM Role for Cluster Autoscaler Automatically (preferred)
            • Option 2: Create IAM Role for Cluster Autoscaler Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
          • Deploy Cluster Autoscaler
            • What You’ll Need
            • Option 1: Deploy Cluster Autoscaler Automatically (preferred)
            • Option 2: Deploy Cluster Autoscaler Manually
              • Procedure
              • Verify
            • Summary
            • What’s Next
    • Deploy NVIDIA Device Plugin
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Deploy Kiwi (Arrikto vGPU)
      • What You’ll Need
      • Procedure
        • Grant Kiwi Components Access to Arrikto’s Private Registry
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Deploy Kiwi Components
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
    • Expose EKF
      • What You’ll Need
      • Procedure
        • Expose EKF on AWS
          • Expose EKF on AWS with ALB
            • Create Hosted Zone
              • What You’ll Need
              • Check Your Environment
              • Option 1: Create Hosted Zone Automatically (preferred)
              • Option 2: Create Hosted Zone Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Create IAM Role for ExternalDNS
              • What You’ll Need
              • Check Your Environment
              • Option 1: Create IAM Role for ExternalDNS Automatically (preferred)
              • Option 2: Create IAM Role for ExternalDNS Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Deploy ExternalDNS
              • What You’ll Need
              • Option 1: Deploy ExternalDNS Automatically (preferred)
              • Option 2: Deploy ExternalDNS Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Create ACM Certificate
              • What You’ll Need
              • Check Your Environment
              • Option 1: Create ACM Certificate Automatically (preferred)
              • Option 2: Create ACM Certificate Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Deploy cert-manager
              • What You’ll Need
              • Option 1: Deploy cert-manager Automatically (preferred)
              • Option 2: Deploy cert-manager Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Create IAM Role for AWS Load Balancer Controller
              • What You’ll Need
              • Check Your Environment
              • Option 1: Create IAM Role for AWS Load Balancer Controller Automatically (preferred)
              • Option 2: Create IAM Role for AWS Load Balancer Controller Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Deploy AWS Load Balancer Controller
              • What You’ll Need
              • Option 1: Deploy AWS Load Balancer Controller Automatically (preferred)
              • Option 2: Deploy AWS Load Balancer Controller Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Configure ALB Subnets
              • What You ‘ll Need
              • Option 1: Configure ALB Subnets Automatically (preferred)
              • Option 2: Configure ALB Subnets Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Deploy NGINX Ingress Controller
              • What You’ll Need
              • Option 1: Deploy NGINX Ingress Controller Automatically (preferred)
              • Option 2: Deploy NGINX Ingress Controller Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Expose Istio
              • What You’ll Need
              • Option 1: Expose Istio Automatically (preferred)
              • Option 2: Expose Istio Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
          • Expose EKF on AWS with ELB
            • Deploy cert-manager
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
            • Configure ELB Subnets
              • What You ‘ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
            • Deploy NGINX Ingress Controller
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
            • Expose Istio
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
        • Expose EKF on Azure
          • Deploy cert-manager
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Deploy NGINX Ingress Controller
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Expose Istio
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
        • Expose EKF on Google Cloud
          • Deploy NGINX Ingress Controller
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Create Cloud DNS Managed Zone
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Deploy ExternalDNS
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Assign FQDN to GCLB
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Deploy cert-manager
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Expose Istio
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
    • Expose Serving
      • What You’ll Need
      • Procedure
        • Expose Serving on AWS
          • Expose Serving on AWS with ALB
            • Create Hosted Zone
              • What You’ll Need
              • Check Your Environment
              • Option 1: Create Hosted Zone Automatically (preferred)
              • Option 2: Create Hosted Zone Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Create IAM Role for ExternalDNS
              • What You’ll Need
              • Check Your Environment
              • Option 1: Create IAM Role for ExternalDNS Automatically (preferred)
              • Option 2: Create IAM Role for ExternalDNS Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Deploy ExternalDNS
              • What You’ll Need
              • Option 1: Deploy ExternalDNS Automatically (preferred)
              • Option 2: Deploy ExternalDNS Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Create ACM Certificate
              • What You’ll Need
              • Check Your Environment
              • Option 1: Create ACM Certificate Automatically (preferred)
              • Option 2: Create ACM Certificate Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Deploy cert-manager
              • What You’ll Need
              • Option 1: Deploy cert-manager Automatically (preferred)
              • Option 2: Deploy cert-manager Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Create IAM Role for AWS Load Balancer Controller
              • What You’ll Need
              • Check Your Environment
              • Option 1: Create IAM Role for AWS Load Balancer Controller Automatically (preferred)
              • Option 2: Create IAM Role for AWS Load Balancer Controller Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Deploy AWS Load Balancer Controller
              • What You’ll Need
              • Option 1: Deploy AWS Load Balancer Controller Automatically (preferred)
              • Option 2: Deploy AWS Load Balancer Controller Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Configure ALB Subnets
              • What You ‘ll Need
              • Option 1: Configure ALB Subnets Automatically (preferred)
              • Option 2: Configure ALB Subnets Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Deploy NGINX Ingress Controller
              • What You’ll Need
              • Option 1: Deploy NGINX Ingress Controller Automatically (preferred)
              • Option 2: Deploy NGINX Ingress Controller Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Configure KServe
              • What You’ll Need
              • Option 1: Configure KServe Automatically (preferred)
              • Option 2: Configure KServe Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
            • Expose Istio
              • What You’ll Need
              • Option 1: Expose Istio Automatically (preferred)
              • Option 2: Expose Istio Manually
                • Procedure
                • Verify
              • Summary
              • What’s Next
          • Expose Serving on AWS with ELB
            • Deploy cert-manager
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
            • Configure ELB Subnets
              • What You ‘ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
            • Deploy NGINX Ingress Controller
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
            • Configure KServe
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
            • Expose Istio
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
        • Expose Serving on Azure
          • Deploy cert-manager
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Deploy NGINX Ingress Controller
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Configure KServe
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Expose Istio
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
        • Expose Serving on Google Cloud
          • Deploy NGINX Ingress Controller
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Create Cloud DNS Managed Zone
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Deploy ExternalDNS
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Assign FQDN to GCLB
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Deploy cert-manager
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Configure KServe
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Expose Istio
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
    • Troubleshooting FAQ
      • Rok cleanup is stuck
        • Reason
        • Workaround
      • Kubeflow cleanup is stuck
        • Reason
        • Workaround
    • Air gapped Deployments
      • Mirror Arrikto GitOps Repository
        • Procedure
          • Mirror Arrikto GitOps Repository Using Bitbucket
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
          • Mirror Arrikto GitOps Repository Using GitLab
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
          • Mirror Arrikto GitOps Repository Manually Using Git
            • Procedure
              • Create Internal Git Repository
                • What You’ll Need
                • Procedure
                • Summary
                • What’s Next
              • Fetch Arrikto GitOps Repository Locally
                • What You’ll Need
                • Procedure
                • Summary
                • What’s Next
              • Mirror Arrikto GitOps Repository
                • What You’ll Need
                • Procedure
                • Summary
                • What’s Next
      • Mirror Images to Internal Registry
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
      • Patch All Images for Your Deployment
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
      • Use Mirrored Kale Python Image
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
  • Integrations
    • GitLab
      • Deploy GitLab
      • Add Kubernetes Cluster to GitLab
    • Identity Providers (OIDC)
      • What You’ll Need
      • Procedure
        • GitLab
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Google
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Okta
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • PingID
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Azure AD
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • AWS Cognito
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
    • AuthService
      • Introduction
        • What is the problem?
        • Cloud-Native Proxies
        • The AuthService
      • Configure the AuthService
        • Control Access Based on Groups
    • Rok Registry Authentication
      • What You’ll Need
      • Configuration Settings
      • Configure Social Providers
        • 1. Register an Application
        • 2. Edit Manifests
          • Enable the Social Authentication Method
          • Configure Social Providers
          • Configure Client Secrets
          • Create the Secret Generator
          • Allow Email Symbols (optional)
        • 3. Commit Changes
        • 4. Apply changes
      • Summary
      • What’s Next
    • Kustomize
      • Intro
      • Installing multiple kustomizations
  • Upgrades
    • EKF 2.0
      • What You’ll Need
      • Check Your Environment
      • Procedure
        • Upgrade Management Environment
          • What You’ll Need
          • Procedure
            • Upgrade Management Environment on Kubernetes
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
            • Upgrade Management Environment on Docker
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
            • Upgrade Management Environment on Cloud Instance
              • What You’ll Need
              • Procedure
              • Verify
              • Summary
              • What’s Next
        • Switch Release Channel
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade Manifests
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade AWS Load Balancer Controller
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade NGINX Ingress Controller
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade Serving NGINX Ingress Controller
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade Istio
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade Rok
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade and Scale Up Rok etcd
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade Rest Rok Components
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade Kubeflow
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade Rok Registry
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade Rok Registry etcd
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade NVIDIA Device Plugin
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade ExternalDNS
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Migrate from FluentD to Fluent Bit
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Test Upgrade
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
  • Features
    • GitOps
      • Components of GitOps-Based Deployments
      • Repository Setup
      • EKF GitOps Workflow
        • Naming Conventions
        • Deploy EKF
        • Save Cluster Configuration
        • Marking Progress
        • EKF Upgrade
        • Deployment Best Practices
    • rok-deploy
      • Task Structure
      • List Deployment Tasks
      • Error Handling
      • Input Sources
      • How to Launch rok-deploy
      • Summary
      • What’s Next
    • Pipelines
      • Pipelines from Notebooks
        • Annotate Cells
          • Annotate One Cell
          • Annotate Multiple Cells
        • Kale Notebook Cell Types
          • Imports Cells
            • Purpose
            • Annotate Imports Cells
          • Functions Cells
            • Purpose
            • Annotate Functions Cells
          • Pipeline Parameters Cells
            • Hyperparameters
            • Purpose
            • Annotate Pipeline Parameters Cells
          • Pipeline Step Cells
            • Annotate Pipeline Step Cells
            • Step name Parameter
            • Depends on Parameter
            • GPU Parameter
            • DeployConfig Parameter
            • Parallel Pipeline Steps
          • Skip Cells
            • Purpose
            • Annotate Skip Cells
          • Pipeline Metrics Cells
            • Purpose
            • Annotate Pipeline Metrics Cell
        • Run a Pipeline
          • How to Run a Pipeline
          • How Kale Creates a Pipeline Step
          • How Kale Marshals Data
      • Pipelines with the Kale SDK
    • Hyperparameter Tuning
      • Hyperparameters
      • Katib Concepts
        • Experiment
        • Trial
        • Job
      • HP Tuning in Notebooks
        • Prepare Your Notebook
          • Identify a Model
            • Select the Best Performing Model
            • Exclude Other Models
          • Pipeline Parameters Cells
            • Hyperparameters
            • Purpose
            • Annotate Pipeline Parameters Cells
          • Pipeline Metrics Cells
            • Purpose
            • Annotate Pipeline Metrics Cell
        • Set Up a Katib Job
          • Search Space Parameters
          • Search Algorithm
            • Grid Search
            • Random Search
            • Bayesian Optimization
          • Search Objective
            • Reference Metric
            • Type
            • Goal
          • Run Parameters
            • Parallel Trial Count
            • Max Trial Count
            • max Failed Trial Count
      • HP Tuning with the Kale SDK
    • Kubeflow Notebooks
      • Kubernetes Pods and Kubeflow
      • Kubeflow Docker Images and Notebooks
      • Kale Docker Images and Notebooks
      • Rok and Notebook Volumes
    • Rok Snapshotting
      • Kale Kubeflow Pipeline and Rok Snapshots
      • Kubeflow Pipeline and Initial Rok Snapshot
      • Kubeflow Pipeline Steps and Rok Snapshots
      • Rok Snapshot Creation and Rok Buckets
      • Rok Snapshots Outside of I/O Path
      • Rok Snapshots & Environment Restoration
      • Rok Snapshots and Volume Restoration
      • Rok Snapshots and Pipeline Restoration
    • Scaling
      • Upper Bound
      • Time to Scale
      • Challenges
        • Rok etcd Volume Type
        • Rok Readiness
        • Resource Quotas
        • Cloud Provider Capacity
        • Docker Hub Rate Limiting
    • Kiwi
      • Schedule Arrikto vGPUs on Kubernetes
      • Kiwi Scheduler
      • Example Timeline of Kiwi Applications
  • User Guides
    • Administration
      • Configure the garbage collection of Rok tasks
    • Kernel Modules
      • What You’ll Need
      • Procedure
      • Summary
      • What’s Next
    • Authentication and Authorization
      • What’s Next
        • Login with OIDC
          • Step-by-Step Analysis
          • Summary
          • What’s Next
        • Account Creation
          • Step-by-Step Analysis
          • Summary
          • What’s Next
        • Authentication with Kubernetes Service Accounts
          • Step-by-Step Analysis
          • Summary
          • What’s Next
        • Authentication with External Identity Providers
          • What’s Next
            • Authentication with External Identity Providers using Opaque Tokens
              • Step-by-Step Analysis
              • Summary
              • What’s Next
            • Authentication with External Identity Providers Using JWT
              • Step-by-Step Analysis
              • Summary
              • What’s Next
        • Authentication with Cookie
          • Step-by-Step Analysis
          • Summary
          • What’s Next
        • End-to-End User Authentication
          • Step-by-Step Analysis
          • Summary
          • What’s Next
        • Authorization with Kubernetes RBAC
          • Step-by-Step Analysis
          • Summary
          • What’s Next
        • Single Sign-On (SSO)
          • What’s Next
        • Single Logout (SLO)
          • What’s Next
    • Access Services with External Clients
      • What You’ll Need
      • Procedure
        • Create Identity
          • What You’ll Need
          • Procedure
            • Option 1: Create Identity Automatically (preferred)
            • Option 2: Create Identity Manually
          • Summary
          • What’s Next
        • Authorize Identity
          • What You’ll Need
          • Procedure
            • Option 1: Authorize Identity Automatically (preferred)
            • Option 2: Authorize Identity Manually
          • Summary
          • What’s Next
        • Create Short-Lived Token to Authenticate External Client
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
    • Kubeflow Pipelines
      • Access Kubeflow Pipelines
        • What You’ll Need
        • Procedure
          • Access Kubeflow Pipelines from Pod
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
          • Access Kubeflow Pipelines from External Client
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
      • Pipeline Parameter Macros
        • How to apply a macro
        • One-off runs
        • Recurring runs
        • Timestamp formatting
    • Kale
      • Kale SDK
        • Create a Pipeline
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Data Passing with Volumes
          • What You’ll Need
          • Procedure
            • Volumes and Snapshots
            • Marshal Volume
          • Summary
          • What’s Next
        • Declare Input and Output Data Types
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Run Steps in Parallel
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Create Custom Container Steps
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Create Parameterized Pipelines
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Log KFP Metrics
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Create KFP HTML Artifacts
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Create Conditional Statements
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Create Parallel Steps with Loops
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Set Kubernetes Configurations
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
      • MLMD Integration
        • Log Model
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
      • Katib Integration
        • What You’ll Need
        • Procedure
          • HP Tuning with the Kale SDK
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
          • HP Tuning with the Kale JupyterLab Extension
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
      • Serving Integration
        • Model Management
          • Model Artifacts
          • Serve a Model Artifact
        • Serving Runtimes
        • Tutorials
          • Serve Scikit Learn Models
            • What You’ll Need
            • Procedure
              • Explore Dataset
              • Serve Scikit Learn Model
              • Get Predictions
            • Summary
            • What’s Next
          • Serve TensorFlow Models
            • What You’ll Need
            • Procedure
              • Explore Dataset
              • Serve TensorFlow Model
              • Get Predictions
            • Summary
            • What’s Next
          • Serve PyTorch Models
            • What You’ll Need
            • Procedure
              • Explore Dataset
              • Serve PyTorch Model
              • Get Predictions
            • Summary
            • What’s Next
          • Serve XGBoost Models
            • What You’ll Need
            • Procedure
              • Explore Dataset
              • Serve XGBoost Model
              • Get Predictions
            • Summary
            • What’s Next
          • Serve LightGBM Models
            • What You’ll Need
            • Procedure
              • Load & Split the Dataset
              • Serve LightGBM Model
              • Get Predictions
            • Summary
            • What’s Next
          • Serve a Python Function using Triton
            • What You’ll Need
            • Procedure
              • Create a Triton Inference Server Python Backend
              • Serve a Python function with Triton
              • Get Predictions
            • Summary
            • What’s Next
          • Serving Runtimes
            • What You’ll Need
            • Procedure
              • Serve the model
              • Get Predictions
            • Summary
            • What’s Next
          • Serve Custom Models
            • Build Custom Model Server Image
              • What You’ll Need
              • Procedure
              • Summary
              • What’s Next
            • Build Custom Transformer Image
              • What You’ll Need
              • Procedure
              • Summary
              • What’s Next
            • Serve Custom Model
              • What You’ll Need
              • Procedure
                • Serve Model
                • Get Predictions
              • Summary
              • What’s Next
            • Serve Custom Model with Custom Transformer
              • What You’ll Need
              • Procedure
                • Serve Model
                • Get Predictions
              • Summary
              • What’s Next
            • Serve Custom Model with Transformer Artifact ID
              • What You’ll Need
              • Procedure
                • Create Transformer Artifact ID
                • Serve Model
                • Get Predictions
              • Summary
              • What’s Next
            • Serve Model Artifact ID with Custom Transformer
              • Procedure
                • Create Model Artifact ID
                • Serve Model
                • Get Predictions
              • Summary
              • What’s Next
          • Configure Specs for Model
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
          • Invoke Existing InferenceService
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
          • Serve Model from Notebook
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
      • Distributed Training
        • PyTorch Integration
          • What You’ll Need
          • Procedure
            • PyTorch Distributed with Kale
              • What You’ll Need
              • Procedure
              • Summary
              • What’s Next
            • Example: Create a PyTorch Distributed KFP Step with the Kale SDK
              • What You’ll Need
              • Procedure
              • Summary
              • What’s Next
            • Example: Configure a PyTorch Distributed KFP Step with the Kale SDK
              • What You’ll Need
              • Procedure
              • Summary
              • What’s Next
            • Example: Schedule the Learning Rate in a PyTorch Distributed Run
              • What You’ll Need
              • Procedure
              • Summary
              • What’s Next
        • TensorFlow Keras Integration
          • What You’ll Need
          • Procedure
            • TensorFlow Keras Distributed with Kale
              • What You’ll Need
              • Procedure
              • Summary
              • What’s Next
            • Example: Create a TensorFlow Keras Distributed KFP Step with the Kale SDK
              • What You’ll Need
              • Procedure
              • Summary
              • What’s Next
      • Use GPUs
        • Use GPU Jupyter Images
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
      • Kale APIs
        • Common
          • Kale Model Artifact
            • Import
            • Attributes
            • Initialization
            • ML Frameworks
          • Kale Transformer Artifact
            • Import
            • Attributes
            • Initialization
        • Serve
          • Kale Serve API
            • Import
            • Attributes
            • Initialization
          • ServeConfig
            • Import
            • Attributes
            • Initialization
        • DeployConfig
          • Import
          • Attributes
          • Initialization
        • DistributedConfig
          • Import
          • Attributes
          • Initialization
    • Kiwi
      • Use Arrikto vGPUs
        • Use Arrikto vGPU for Kubernetes Workload
        • Create Arrikto vGPU-enabled Jupyter Notebook Server
        • Use Arrikto vGPU in Kale Notebook Cell
        • Summary
        • What’s Next
      • Run a Pipeline on Arrikto vGPUs using the Kale SDK
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
      • Enable Kiwi Debug Logs for a Notebook Server
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • KServe
      • Serving on EKF
        • Serving Architecture
          • Request Path
            • Internal Client
            • External Client
            • Using Activator Only When Scaled to Zero
          • Summary
          • What’s Next
        • Configure Serving for Better Performance
          • Resources
            • istio-proxy Sidecar
            • queue-proxy Sidecar
            • Istio Ingress Gateway
          • Knative
            • Activator
            • Autoscaling
          • AuthService Caching
          • Summary
          • What’s Next
        • Performance Evaluation
          • Baseline
            • Single Triton Server
            • Multiple Triton Server per Node
            • Conclusions
          • Serving Overhead
            • Default Setup
            • Modified Setup and Isolated Ingress Gateway
            • Modified Setup and Co-located Ingress Gateway
            • Conclusions
          • Scaling
            • Conclusion
          • External URL
            • Conclusion
          • Summary
          • What’s Next
        • Serving Testbed
          • What You’ll Need
          • Infrastructure
          • Inference Service
          • Clients
            • Hey Usage
              • Concurrency
              • Parallelism
              • Prediction URL
              • Output
          • What’s Next
      • Invoke Existing InferenceService with External Client
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
    • EKF Monitoring
      • Rok Monitoring Stack Architecture
        • Introduction
        • Components
        • Monitoring Targets
          • Physical Nodes
          • Kubernetes
          • EKF Istio
          • Rok Etcd
          • Rok Redis
          • Rok
        • Summary
        • What’s Next
      • Rok Monitoring Stack UIs
        • Access Prometheus UI
        • Access Grafana UI
        • Summary
        • What’s Next
      • Physical Node Monitoring
        • Introduction
        • Metrics
        • Guides
          • Free Node Space Monitoring
            • What You’ll Need
            • Metrics
            • View Grafana Dashboards
            • Summary
            • What’s Next
      • Etcd Monitoring
        • Introduction
        • Metrics
        • View Grafana Dashboard
        • Summary
        • What’s Next
      • Rok Monitoring
        • Introduction
        • Metrics
        • View Grafana Dashboard
        • Summary
        • What’s Next
    • Command execution
      • Examples
        • Import the module
        • Run a command and print to the console
        • Run a command and capture its output
        • Run a command and capture its output, while printing to the console
        • Run a command and write to its stdin
        • Run a command asynchronously
        • Run a command with a timeout
        • Run a command and preserve whitespace
        • Enable logging
        • Create a generic command that accepts parameters
    • Rok
      • Create Rok Volumes
        • Parameters
        • Volume Auto-Recovery
        • Volume Hydration
        • Create Empty RWO PVC on Rok
        • Create Empty RWX PVC on Rok
      • Rok Snapshots
        • Parameters
        • Snapshot PVC Backed by Rok
        • Create Volume from a Kubernetes Snapshot
        • Create PVC from a Rok Resource
        • Create StatefulSet from a Rok Group Resource
      • Access Rok
        • What You’ll Need
        • Procedure
          • Access Rok from Within Cluster
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
          • Access Rok from External Client
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
      • Snapshot Notebook
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
      • Present Notebook
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
      • Snapshot policies for Backup
        • Snapshot policy for Jupyter notebooks
          • Rok UI
            • Create a snapshot policy
            • Configure the version retention policy
          • Rok CLI
            • Create a snapshot policy
            • Configure the version retention policy
      • Update Rok Wheels Inside Your Notebook
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Rok Disk Manager
      • Introduction
      • Selecting Disks
      • Step-by-Step Analysis
        • Select Disks for Rok
        • Assemble RAID Array
        • Allocate Rok Snapshot Space
        • Format Rok Snapshot Space
      • Summary
      • What’s Next
    • Rok Registry
      • Register Rok Cluster with Rok Registry
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Publish Bucket
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Subscribe to Bucket
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
  • Operations Guide
    • Automated Deployments
      • Generate Manifests
        • What You’ll Need
        • Procedure
          • Option 1: Generate Manifests Interactively
          • Option 2: Generate Manifests Non-Interactively
        • Verify
        • Summary
        • What’s Next
      • Non-Interactive EKF Deployment
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Manage Your EKS Cluster
      • Enable Logging
        • Enable Amazon EKS Control Plane Logging
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Create IAM Role for Fluent Bit
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Deploy Fluent Bit
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
      • Share EKS Cluster
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
      • Manage Unhealty Instances
        • What You’ll need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Scale Your EKS Cluster
        • Scale In EKS Cluster
          • What You’ll need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Scale Out EKS Cluster
          • What You’ll need
          • Procedure
          • Verify
          • Summary
          • What’s Next
      • EKS Upgrade
        • Upgrade EKS Control Plane
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade EKS Node Group
          • Upgrade EKS Managed Node Groups
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
          • Upgrade EKS Self-Managed Node Groups
            • What You’ll Need
            • Check Your Environment
            • Procedure
            • Verify
            • Summary
            • What’s Next
        • Configure Rok Scheduler for your Kubernetes Version
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Configure Cluster Autoscaler for your Kubernetes Version
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
      • Back Up Rok etcd EBS Volume
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Increase Rok etcd EBS Volume IOPS
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Manage Your GKE Cluster
      • Create Node Pool
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • GKE Upgrade
        • Upgrade GKE Control Plane
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Upgrade GKE Node Pools
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Update Maintenance Exclusion
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Configure Rok Scheduler for your Kubernetes Version
          • What You’ll Need
          • Check Your Environment
          • Procedure
          • Verify
          • Summary
          • What’s Next
    • Manage Your AKS Cluster
      • Enable Azure Monitor
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Manage Rok etcd
      • Scale Up Rok etcd
        • What You’ll Need
        • Check Your Environment
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Scale Down Rok etcd
        • What You’ll Need
        • Check Your Environment
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Restore Failing Rok etcd Member
        • What You’ll Need
        • Check Your Environment
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Manage Authentication
      • Configure AuthService to Use Specific Authentication Methods
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Configure AuthService Audiences
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Enable AuthService Caching Mechanism
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Configure Default Retention Policy for New Buckets
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Update Retention Policy of all Buckets
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Create Privileged Notebook Server
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Migrate EKF Cluster
      • Back Up EKF cluster
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Restore EKF cluster
        • What You’ll Need
        • Check Your Environment
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Manage Your Kubeflow Deployment
      • Create Profile
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Share Namespace
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
      • Share Namespace with OIDC Group
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
      • Delete Profile
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Configure Notebook Culling
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Spin Up Notebooks with Image from Private Registry
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
      • Configure Jupyter Web App
        • Extend List of JWA Default Images
          • What You’ll Need
          • Procedure
          • What’s Next
        • Extend List of JWA Preselected Configurations
          • What You’ll Need
          • Procedure
          • What’s Next
      • Configure Default Snapshot Policy for Notebooks
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Configure Default Retention Policy for Notebook Snapshots
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Clean Up KFP Artifacts from MinIO
        • What You’ll Need
        • Check Your Environment
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Configure Argo Workflow Executor
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Create Custom Kale Image
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Configure Custom Kale Python Image
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Switch Between Host-based and Path-based Serving
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Manage Security Policies With Kyverno
      • Add Security Policy
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Disable Security Policy
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Enable or Disable Kyverno In User Namespaces
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Manage Networking
      • Identify the Public IP Address of Your Management Environment
        • Procedure
          • Identify the Public IP Address of Your Cloud Instance
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
      • Identify Outbound IP Adresses
        • Procedure
          • Identify Outbound IP Addresses on EKS
            • What You’ll Need
            • Procedure
            • Summary
            • What’s Next
      • Authorize Inbound Traffic
        • Authorize Inbound Traffic for Your EKF Deployment
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Authorize Inbound Traffic for Your Rok Sync Daemon
          • What You’ll Need
          • Procedure
          • Summary
          • What’s Next
        • Authorize Inbound Traffic for Your EKS Cluster from Your Management Environment
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
    • Manage Your Rok Registry Cluster
      • Issue Token for Rok Registry User
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Add an internal GitHub repository as a backup GitOps remote
      • What You’ll Need
      • Procedure
      • Summary
      • What’s Next
    • Set Up Cluster-Wide Authenticated Access to a Docker Registry
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Disable Automatic Profile Creation
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Scale In Kubernetes Cluster
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Protect Pods from OOM conditions and CPU starvation
      • Protect System Pods from OOM conditions
        • Protect Rok System Pods
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Protect Rok External Services Pods
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Protect Arrikto EKF Pods
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
      • Protect System Pods from CPU starvation
        • Protect Rok System Pods
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Protect Arrikto EKF Pods
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
    • Add Static Users in Dex
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Hot-Patch an Arbitrary Image in Your Deployment
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Expose TokenRequest API for External Clients
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Configure Syncing
      • Set Up Rok Registry Admin
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Configure Default Rok Registry URL
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Expose Sync Daemon
        • What You’ll Need
        • Procedure
          • Expose Sync Daemon on AWS
            • What You’ll Need
            • Procedure
            • Verify
            • Summary
            • What’s Next
      • Announce Sync Daemon Address
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Trust Custom CA
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Add Extra Resources To All User Namespaces
      • What You’ll Need
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Gather Logs for Troubleshooting
      • Gather Logs for Troubleshooting
        • What You’ll Need
        • Option 1: Gather Logs Automatically (preferred)
        • Option 2: Gather Logs Manually
          • Procedure
        • Summary
        • What’s Next
      • Send Logs to Arrikto for Troubleshooting
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
      • Retrieve Rok Task Logs
        • What You’ll Need
        • Procedure
        • Summary
        • What’s Next
    • Recover RWX Volume After Node Failure
      • What You’ll Need
      • Check Your Environment
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Recover Pods From Out of Space Errors
      • What You’ll Need
      • Check Your Environment
      • Procedure
      • Verify
      • Summary
      • What’s Next
    • Manage Your Rok Monitoring Stack
      • Grant Rok Monitoring Stack Admin Privileges
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Revoke Rok Monitoring Stack Admin Privileges
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
    • Handle Degraded Nodes
      • What You’ll Need
      • Procedure
        • Cordon Degraded Nodes
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
        • Drain Degraded Nodes
          • What You’ll Need
          • Procedure
          • Verify
          • Summary
          • What’s Next
    • Manage Your Kiwi-enabled GPUs
      • Configure Time Window for Exclusive GPU Access
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Enable or Disable Kiwi Scheduler
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
  • Clean Up
    • What You’ll Need
    • Procedure
      • Clean Up Applications Using Rok
        • What You’ll Need
        • Check Your Environment
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Clean Up Rok Scheduler
        • What You’ll Need
        • Check Your Environment
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Clean Up Rok Components
        • What You’ll Need
        • Check Your Environment
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Clean Up Storage
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Clean Up Cloud Identity
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
      • Clean Up Kubernetes Cluster
        • What You’ll Need
        • Procedure
        • Verify
        • Summary
        • What’s Next
  • News
    • Version 2.0.1 (Aurora)
      • Latest and Greatest
        • Support for Kubernetes 1.23
      • Bug fixes
        • Stability
      • Security
        • Remove Critical CVEs
      • Ease of Use
        • Arrikto Skin
    • Version 2.0 (Aurora)
      • Serving
        • Path-based Serving
        • Migration to KServe
        • Serving APIs (Technical Preview)
      • Portability
        • EKF Cluster Migration
      • Security
        • Additional Authentication Methods with External Identity Providers
        • Migrate Rok Images to Debian Buster
        • Remove Critical CVEs
        • Network Mesh
        • Restrict Privileged Containers Execution
        • Kubeflow Backends Protection
      • ML Workflow
        • Restore Notebook from a Rok Snapshot
      • High Availability
        • Etcd Replication
      • Ease of Use
        • New Notebook Wizard
        • Sorting and Filtering
        • Notebooks and Volumes Details Pages
        • Link Everything Across Kubeflow Web Apps
        • Generate Manifests for EKF deployment
        • Non-interactive EKF installation
        • Retention Policies
      • Latest and Greatest
        • Support for Kubernetes 1.22
        • EKF with Kubeflow 1.5
        • Rok with Etcd 3.5.4
      • Infra Optimization/Enablement
        • Kiwi (Technical Preview)
      • Bug Fixes
        • Stability
        • Improve how Kale Uses MLMD
        • Kale Retry Strategy Parameters
        • Kale Logging
        • No Status in Notebook CR
        • PVC Viewer Culling
      • Known Issues
        • Switch to Emissary Argo Executor
    • Version 1.5.3 (Ultramarine)
      • Bug Fixes
    • Version 1.5.2 (Ultramarine)
      • Security
        • Remove Critical CVEs
      • Improvements/Bugfixes
        • Take Into Account Type Hints in Kale Conditional Statements
        • Accept Hundreds of New Connections on Rok Controller
        • Fix Race on Garbage Collection Tasks
        • Fix Kernel Bug Leading to Failed Snapshots
        • Fix Bug in Rok CSI Driver Volume Provisioning Response
    • Version 1.5.1 (Ultramarine)
      • Bug Fixes
    • Version 1.5 (Ultramarine)
      • Security
        • Configure AuthService Audiences
      • Improvements
        • Configure Authentication Methods
    • Version 1.5-rc4 (Ultramarine)
      • Security
        • Remove Critical CVEs
      • Improvement/Bugfix
        • Support Bound Service Account Tokens on Kubernetes 1.21
        • Delete Rok Accounts Properly
    • Version 1.5-rc3 (Ultramarine)
      • Serving
        • End-to-End Network Performance Evaluation for Serving
      • Security
        • Authenticate External Applications with Identity Providers
      • Portability
        • Support Rok Registry on Google Cloud
      • Improvement/Bugfix
        • Mitigate CoreDNS Flooding Caused by Knative Inference Services
    • Version 1.5-rc2 (Ultramarine)
      • Serving
        • Enable AuthService Cache
      • Integrations
        • Integrate EKF with AWS Cognito
      • Latest and Greatest
        • Support for Kubernetes 1.21
    • Version 1.5-rc1 (Ultramarine)
      • Portability
        • Lift and Shift an Arrikto EKF Cluster
      • Serving
        • Access to KFServing from Outside the Cluster
        • End-to-End Network Performance Evaluation for Serving
      • Security
        • Secure Traffic of Served Model with Istio
        • Usage of Istio Sidecar with mTLS
        • Security Report
        • Namespaced Pipeline Definitions
        • Remove Contributors UI from Central Dashboard
      • Infra Optimization/Enablement
        • Capacity Tracking for Local Volumes in Kubernetes
        • View Resources Across All Namespaces in EKF Dashboard
        • Fine-Grained Control for Kale Pipelines
        • Monitoring Dashboard
      • ML Workflow
        • Pipeline Looping with Kale
        • Kale Step Functions with Keyword Arguments
        • Support Type Hints for Step Definitions in the Kale SDK
        • Distributed Training with Kale and PyTorch
      • Ease of Use
        • Kale Images with GPU Support
        • Kale-powered VSCode Νotebook Ιmage
      • Automation
        • Automate the Log Gathering Process
        • Enhance Deployment Automation Process (AWS)
      • Integrations
        • Integrate EKF with Azure AD
      • Latest and Greatest
        • Support for Kubernetes 1.20
        • Upgrade CSI Snapshot CRDs from v1alpha1 to v1beta1
        • Ship Kale Notebook Images with Python 3.8
        • Support for JupyterLab 3.X
      • Improvement/Bugfix
        • Configurable Rok Registry URL
        • Support the KFP Caching Mechanism
    • Version 1.4.4 (Titanium)
      • New features
      • Bug Fixes
    • Version 1.4.3 (Titanium)
      • New features
      • Bug Fixes
    • Version 1.4.2 (Titanium)
      • Bug Fixes
    • Version 1.4.1 (Titanium)
      • New features
      • Bug Fixes
    • Version 1.4 (Titanium)
      • New features
      • Bug Fixes
      • Known Issues
    • Version 1.4-rc8 (Titanium)
      • New features
      • Bug Fixes
    • Version 1.4-rc7 (Titanium)
      • Bug Fixes
    • Version 1.4-rc6 (Titanium)
      • New features
      • Bug Fixes
    • Version 1.4-rc5 (Titanium)
      • New features
      • Bug Fixes
    • Version 1.4-rc4 (Titanium)
      • New features
      • Bug Fixes
    • Version 1.4-rc3 (Titanium)
      • New features
      • Bug Fixes
    • Version 1.4-rc2 (Titanium)
      • New features
      • Bug Fixes
    • Version 1.4-rc1 (Titanium)
      • New features
      • Bug Fixes
    • Version 1.3.1 (Sapphire)
      • New features
    • Version 1.3 (Sapphire)
      • New features
      • Bug Fixes
    • Version 1.3-rc8 (Sapphire)
      • New features
      • Bug Fixes
    • Version 1.3-rc7 (Sapphire)
      • New features
      • Bug Fixes
    • Version 1.3-rc6 (Sapphire)
      • New features
    • Version 1.3-rc5 (Sapphire)
      • Bug Fixes
    • Version 1.3-rc4 (Sapphire)
      • Bug Fixes
    • Version 1.3-rc3 (Sapphire)
      • New features
    • Version 1.3-rc2 (Sapphire)
      • New features
    • Version 1.3-rc1 (Sapphire)
      • New features
      • Bug Fixes
    • Version 1.2.2 (Ruby)
      • Bug Fixes
    • Version 1.2.1 (Ruby)
      • Bug Fixes
    • Version 1.2 (Ruby)
      • New features
      • Bug Fixes
    • Version 1.2-rc2 (Ruby)
      • New features
      • Bug Fixes
    • Version 1.2-rc1 (Ruby)
      • New features
      • Bug Fixes
    • Version 1.1.1 (Quartz)
      • Bug Fixes
    • Version 1.1 (Quartz)
      • New features
      • Bug Fixes
    • Version 1.1-rc8 (Quartz)
      • New features
    • Version 1.1-rc7 (Quartz)
      • New features
    • Version 1.1-rc6 (Quartz)
      • New features
    • Version 1.1-rc5 (Quartz)
      • Bug Fixes
    • Version 1.1-rc4 (Quartz)
      • New features
    • Version 1.1-rc3 (Quartz)
    • Version 1.1-rc2 (Quartz)
    • Version 1.1-rc1 (Quartz)
      • Bug Fixes
    • Version 1.0 (Platinum)
      • New features
    • Version 1.0-rc6 (Platinum)
      • Bug Fixes
    • Version 1.0-rc5 (Platinum)
    • Version 1.0-rc4 (Platinum)
      • Bug Fixes
    • Version 1.0-rc3 (Platinum)
    • Version 1.0-rc2 (Platinum)
      • Bug Fixes
    • Version 1.0-rc1 (Platinum)
      • Bug Fixes
    • Version 0.15.1 (Onyx)
      • Bug Fixes
    • Version 0.15 (Onyx)
      • New features
      • Bug Fixes
    • Version 0.14.1 (Nephrite)
      • New features
      • Bug Fixes
    • Version 0.14 (Nephrite)
      • New features
      • Incompatible/important changes
      • Bug Fixes
    • Version 0.13 (Marble)
      • New features
      • Incompatible/important changes
      • Bug Fixes
    • Version 0.13-rc1 (Marble)
      • Bug Fixes
    • Version 0.12 (Lignite)
      • New features
      • Bug Fixes
    • Version 0.12-rc1 (Lignite)
      • Bug Fixes
    • Version 0.11.1 (Kryptonite)
      • Bug Fixes
    • Version 0.11 (Kryptonite)
      • New features
      • Bug Fixes
    • Version 0.11-rc1 (Kryptonite)
      • Bug Fixes
      • Incompatible/important changes
    • Version 0.10.3 (Jade)
      • New features
      • Bug Fixes
    • Version 0.10.2 (Jade)
      • New features
    • Version 0.10.1 (Jade)
      • New features
      • Bug Fixes
    • Version 0.10 (Jade)
      • New features
      • Known Issues
      • Incompatible/important changes
    • Version 0.10-rc1 (Jade)
      • Bug Fixes
    • Version 0.9 (Iron)
      • New features
      • Known Issues
    • Version 0.9-rc3 (Iron)
      • Bug Fixes
    • Version 0.9-rc2 (Iron)
      • Bug Fixes
    • Version 0.9-rc1 (Iron)
      • Bug Fixes
    • Version 0.8.1 (Hematite)
      • Bug Fixes
    • Version 0.8 (Hematite)
      • New features
      • Bug Fixes
    • Version 0.8-rc1 (Hematite)
      • Bug Fixes
    • Version 0.7.2 (Granite)
      • Bug Fixes
    • Version 0.7.1 (Granite)
      • Bug Fixes
    • Version 0.7 (Granite)
      • New features
      • Known Issues
    • Version 0.7-rc2
      • Bug Fixes
    • Version 0.7-rc1 (Granite)
      • Bug Fixes
    • Version 0.6.2 (Flint)
      • Bug Fixes
    • Version 0.6.1 (Flint)
      • Bug Fixes
    • Version 0.6 (Flint)
      • New features
      • Known issues
    • Version 0.6-rc4 (Flint)
      • Bug Fixes
    • Version 0.6-rc3 (Flint)
      • Bug Fixes
    • Version 0.6-rc2 (Flint)
      • Bug Fixes
    • Version 0.6-rc1 (Flint)
      • Bug Fixes
    • Version 0.5 (Emerald)
      • New features
    • Version 0.4.5 (Diamond)
      • Bugfixes
    • Version 0.4.4 (Diamond)
      • New features
    • Version 0.4.3 (Diamond)
      • Bugfixes
    • Version 0.4.2 (Diamond)
      • New features
    • Version 0.4.1 (Diamond)
      • Bugfixes
    • Version 0.4 (Diamond)
      • Incompatible/important changes
      • New features
      • New dependencies
      • Known issues
    • Version 0.3 (Celestite)
    • Version 0.2-rc1 (Beryl)
    • Version 0.2 (Beryl)
    • Version 0.1 (Amethyst)
    • Version 0.1-rc1 (Amethyst)
  • Changelog
    • Version 2.0.1 (Aurora)
      • New Features
      • Bug Fixes
    • Version 2.0 (Aurora)
      • New Features
      • Bug Fixes
      • Bug Fixes
    • Version 2.0-rc3 (Aurora)
      • New Features
      • Bug Fixes
    • Version 2.0-rc2 (Aurora)
      • New Features
      • Bug Fixes
    • Version 2.0-rc1 (Aurora)
      • New Features
      • Bug Fixes
    • Version 1.5.3 (Ultramarine)
      • New Features
      • Bug Fixes
    • Version 1.5.2 (Ultramarine)
      • New Features
      • Bug Fixes
    • Version 1.5.1 (Ultramarine)
      • New Features
      • Bug Fixes
    • Version 1.5 (Ultramarine)
      • New Features
      • Bug Fixes
    • Version 1.5-rc4 (Ultramarine)
      • New Features
      • Bug Fixes
      • Known Issues
    • Version 1.5-rc3 (Ultramarine)
      • New features
      • Bug Fixes
    • Version 1.5-rc2 (Ultramarine)
      • New Features
      • Bug Fixes
    • Version 1.5-rc1 (Ultramarine)
      • New features
      • Bug Fixes
    • Version 1.4.4 (Titanium)
    • Version 1.4.3 (Titanium)
    • Version 1.4.2 (Titanium)
    • Version 1.4.1 (Titanium)
    • Version 1.4 (Titanium)
    • Version 1.3.1 (Sapphire)
    • Version 1.3 (Sapphire)
    • Version 1.2.2 (Ruby)
    • Version 1.2.1 (Ruby)
    • Version 1.2 (Ruby)
    • Version 1.1.1 (Quartz)
    • Version 1.1 (Quartz)
    • Version 1.0 (Platinum)
    • Version 0.15.1 (Onyx)
    • Version 0.15 (Onyx)
    • Version 0.14.1 (Nephrite)
    • Version 0.14 (Nephrite)
    • Version 0.13 (Marble)
    • Version 0.12 (Lignite)
    • Version 0.11.1 (Kryptonite)
    • Version 0.11 (Kryptonite)
    • Version 0.10.3 (Jade)
    • Version 0.10.2 (Jade)
    • Version 0.10.1 (Jade)
    • Version 0.10 (Jade)
    • Version 0.9 (Iron)
    • Version 0.8.1 (Hematite)
    • Version 0.8 (Hematite)
    • Version 0.7.2 (Granite)
    • Version 0.7.1 (Granite)
    • Version 0.7 (Granite)
    • Version 0.6.2 (Flint)
    • Version 0.6.1 (Flint)
    • Version 0.6 (Flint)
    • Version 0.5 (Emerald)
    • Version 0.4.5 (Diamond)
    • Version 0.4.4 (Diamond)
    • Version 0.4.3 (Diamond)
    • Version 0.4.2 (Diamond)
    • Version 0.4.1 (Diamond)
    • Version 0.4 (Diamond)
    • Version 0.3 (Celestite)
    • Version 0.2 (Beryl)
    • Version 0.1 (Amethyst)

Authentication with Cookie¶

This guide describes how AuthService performs authentication with OpenID Connect (OIDC) when the client makes a request with a cookie.

Note

In this guide, we use Client instead of User as the actor of the described Step-by-Step Analysis. AuthService can authenticate both users and their programmatic clients based on their cookie. A programmatic client is an application of the user that can make distinct requests. Therefore, AuthService must authenticate the programmatic client that made the request.

Here’s what you’ll need so that you can authenticate with a cookie:

  • An Arrikto EKF deployment integrated with an external Identity Provider.
  • An existing user account for this Identity Provider.
  • The client must have logged in with OIDC (Login with OIDC). AuthService has created and given a cookie to the client.
  • Kubeflow Reception must have created an account for this user (Account Creation).

Step-by-Step Analysis¶

Here is a step-by-step description of how AuthService authenticates clients based on their cookie.

  1. Client: Request the URL with the cookie.

  2. Istio Gateway: Forward the request to the AuthService.

  3. AuthService: Check if the Kubernetes authentication method can authenticate this request.

    Note

    When authenticating a client with their cookie this check will fail.

  4. AuthService: Check if one of the access token authentication methods can authenticate this request.

    Note

    When authenticating a client with their cookie this check will fail.

  5. AuthService: Authenticate the client based on the session from the cookie.

  6. AuthService: Respond to the Istio Gateway that the client was successfully authenticated (HTTP 200 status) and set the UserID header for the client.

  7. Istio Gateway: Forward the request to Kubeflow with the UserID header.

  8. Kubeflow: Perform the action that the client requested and respond to the Istio Gateway.

    See also

    See more on how Kubeflow performs authorization by using Kubernetes RBAC:

    • Authorization with Kubernetes RBAC
  9. Istio Gateway: Forward the response to the client.

Summary¶

In this guide you gained insight on how AuthService performs authentication with OpenID Connect when the client makes a request with a cookie.

What’s Next¶

The next guide describes User Authentication procedure end-to-end.

  • End-to-End User Authentication
PreviousNext

Products

Enterprise Kubeflow
Rok Data Management

Community

Kubeflow
Tutorials
Events

About

Company
Blog
Careers
Contact
Legal
Start with MiniKF

Connect

© Copyright 2015-2022, Arrikto Inc. All rights reserved.
Build 2.0.1 (release-2.0)